• SG
  • magnifying glass search icon to open search field
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
Palo Alto Networks logo
  • Products
  • Solutions
  • Services
  • Partners
  • Company
  • More
  • SG
    Language
  • Contact Us
  • Resources
  • Get support
  • Under Attack?
  • Unit 42 Threat Intelligence
Cortex XSOAR Overview

CortexTM XSOAR is a comprehensive security orchestration, automation and response (SOAR) platform that unifies case management, automation, real-time collaboration and threat intel management to serve security teams across the incident lifecycle.

31645
Cortex XDR Datasheet

Hunt down and stop stealthy attacks by unifying network, endpoint, and cloud data

78346

Date

  • Last week
  • Last 30 days
  • Last 6 months
  • Last year
  • cortex

Displaying 471 to 480 of 500

  • previous
  • 1
  • 2
  • …
  • 47
  • 48(current)
  • 49
  • 50
  • next
Use Case

The Need for Attack Surface Management in Financial Services

Download this white paper to learn about the challenges of an ever-expanding internet estate on financial services, how Palo Alto Networks Cortex Xpanse can address attack surface management from the outside in, and read about some outcomes achieved by other financial institutions with Xpanse.

505
Press Release

Palo Alto Networks Announces Intent to Acquire Zingbox

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced that it has entered into a definitive agreement to acquire Zingbox, an IoT security company.

4397
References and Case Studies

City University of Hong Kong Case Study

Palo Alto Networks is delivering robust market leading network protection and control for CityU students and academics from around the world to work securely, collaboratively and automatically blocking a diverse range of known and unknown threats, without compromising the end user experience.

697
Webinar

Bridging IT and OT Security with Claroty and Palo Alto Networks

Protecting industrial enterprises and critical infrastructure from cyberattacks requires full visibility into the operational technology (OT) networks to minimize the risks that threats pose to availability, reliability, and safety. However, full visibility is exceedingly difficult to attain due to the prevalence of proprietary protocols, legacy systems, and unfamiliar OT assets.

649
Press Release

Google Cloud and Palo Alto Networks Expand Strategic Partnership

Palo Alto Networks will continue to expand its usage of services running on Google Cloud. Palo Alto Networks is the first cybersecurity partner to meet specialized security solutions requirements for Google Cloud and demonstrate customer success, across five key areas.

2770
Press Release

Palo Alto Networks Secures the Way Forward at Ignite '22

Showcasing the latest Innovations in Network Security, Cloud Security and Security Operations LAS VEGAS, Dec. 13, 2022 /PRNewswire/ -- Today, Palo Alto Networks (NASDAQ: PANW), the global...

691
Press Release

Palo Alto Networks Achieves FedRAMP Authorization for Prisma Access Cloud-Delivered Security

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced that Prisma® Access has achieved Federal Risk and Authorization Management Program (FedRAMP) Moderate...

4898
Press Release

Palo Alto Networks Announces Expansion of Management Team

Palo Alto Networks (NYSE: PANW), the global cybersecurity leader, today announced the expansion of its management team, with Amit Singh moving into the new role of chief business officer and BJ...

2881
References and Case Studies

AIWAYS Case Study

472
Press Release

Palo Alto Networks and HCL Technologies Announce Expanded Relationship to Secure Digital and Cloud Transformation for Global Customers

Offering next-generation cybersecurity solutions that bring Zero Trust to enterprise customers SANTA CLARA, Calif., July 12, 2022 /PRNewswire/ -- Palo Alto Networks (NASDAQ: PANW), the global...

2182

Displaying 471 to 480 of 500

  • previous
  • 1
  • 2
  • …
  • 47
  • 48(current)
  • 49
  • 50
  • next

Get the latest news, invites to events, and threat alerts

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.

black youtube icon black twitter icon black facebook icon black linkedin icon
  • USA (ENGLISH)
  • AUSTRALIA (ENGLISH)
  • BRAZIL (PORTUGUÉS)
  • CANADA (ENGLISH)
  • CHINA (简体中文)
  • FRANCE (FRANÇAIS)
  • GERMANY (DEUTSCH)
  • INDIA (ENGLISH)
  • ITALY (ITALIANO)
  • JAPAN (日本語)
  • KOREA (한국어)
  • LATIN AMERICA (ESPAÑOL)
  • MEXICO (ESPAÑOL)
  • SINGAPORE (ENGLISH)
  • SPAIN (ESPAÑOL)
  • TAIWAN (繁體中文)
  • UK (ENGLISH)

Popular Resources

  • Blog
  • Communities
  • Content Library
  • Cyberpedia
  • Event Center
  • Investors
  • Tech Docs
  • Unit 42
  • Sitemap

Legal Notices

  • Privacy
  • Trust Center
  • Terms of Use
  • Documents

Popular Links

  • About Us
  • Careers
  • Contact Us
  • Manage Email Preferences
Report a Vulnerability

Copyright © 2023 Palo Alto Networks. All rights reserved